ATU Infohub Repository

Intrusion detection on campus network, the open-source approach: Accra Technical University case study

Show simple item record

dc.contributor.author Gbedawo, V.
dc.contributor.author Agbesi, K.
dc.contributor.author Adukpo, T.
dc.date.accessioned 2023-01-27T09:48:16Z
dc.date.available 2023-01-27T09:48:16Z
dc.date.issued 2017
dc.identifier.other 10.5120/ijca2017913664
dc.identifier.uri https://www.ijcaonline.org/archives/volume164/number6/27488-2017913664
dc.identifier.uri http://atuspace.atu.edu.gh:8080/handle/123456789/2709
dc.description.abstract The computer network security landscape in recent times has become a crucial area in computer networking for both network administrators and network users such that, a compromise of this network security makes the services it provides and more importantly the data it holds, highly susceptible to exploits by malicious people for different purposes and reasons. This is particularly so for campus networks in view of the fact that, they do not only provide services to promote academic work directly but in many ways are integrated into the administrative setup of the institutions they serve. This research therefore seeks to investigate the security threats and vulnerabilities of campus networks and systems to a great extent, so as to propose interventions to resolving these threats, vulnerabilities and exploits, so as to improve the security of these networks by conducting a penetration test that simulates Intrusion Detection employing free and open source software (FOSS) tools. The research adopted “Cloppert‟s kill chain” Approach to Penetration Testing. The elements of the simulation included the following FOSS tools VMware Fusion (Operating System simulator), Zentyal Server (unified network server), Snort (Intrusion Detection System), Suricata (Intrusion Prevention System), Nmap (Network scanning), OpenVAS (Vulnerability Assessment Software) and Metasploit Framework (Exploitation tool). Results of the simulation revealed injection flaws to be the prevalent security vulnerability that was exploited and hence, discussed to improve computer network and application security in a rather cost effective fashion en_US
dc.language.iso en_US en_US
dc.publisher International Journal of Computer Applications en_US
dc.relation.ispartofseries vol.;164
dc.subject OWASP top 10 en_US
dc.subject „Kill Chain approach‟ en_US
dc.subject Zentyal server en_US
dc.subject IDS/IPS en_US
dc.subject OpenVAS en_US
dc.subject NVT feed en_US
dc.subject CVE en_US
dc.subject SQL injection en_US
dc.subject Denialof-service attack en_US
dc.subject Overt and Covert attacks en_US
dc.title Intrusion detection on campus network, the open-source approach: Accra Technical University case study en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ATU Infohub


Browse

My Account